{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T14:01:01Z","timestamp":1725717661392},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642368172"},{"type":"electronic","value":"9783642368189"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-36818-9_40","type":"book-chapter","created":{"date-parts":[[2013,3,4]],"date-time":"2013-03-04T11:14:54Z","timestamp":1362395694000},"page":"363-372","source":"Crossref","is-referenced-by-count":0,"title":["Supporting Secure Provenance Update by Keeping \u201cProvenance\u201d of the Provenance"],"prefix":"10.1007","author":[{"given":"Amril","family":"Syalim","sequence":"first","affiliation":[]},{"given":"Takashi","family":"Nishide","sequence":"additional","affiliation":[]},{"given":"Kouichi","family":"Sakurai","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"40_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"148","DOI":"10.1007\/978-3-642-17819-1_18","volume-title":"Provenance and Annotation of Data and Processes","author":"R. Aldeco-P\u00e9rez","year":"2010","unstructured":"Aldeco-P\u00e9rez, R., Moreau, L.: Securing Provenance-Based Audits. In: McGuinness, D.L., Michaelis, J.R., Moreau, L. (eds.) IPAW 2010. LNCS, vol.\u00a06378, pp. 148\u2013164. Springer, Heidelberg (2010)"},{"key":"40_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1007\/11890850_4","volume-title":"Provenance and Annotation of Data","author":"S. \u00c1lvarez","year":"2006","unstructured":"\u00c1lvarez, S., V\u00e1zquez-Salceda, J., Kifor, T., Varga, L.Z., Willmott, S.: Applying Provenance in Distributed Organ Transplant Management. In: Moreau, L., Foster, I. (eds.) IPAW 2006. LNCS, vol.\u00a04145, pp. 28\u201336. Springer, Heidelberg (2006)"},{"key":"40_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"411","DOI":"10.1007\/978-3-540-73420-8_37","volume-title":"Automata, Languages and Programming","author":"M. Bellare","year":"2007","unstructured":"Bellare, M., Namprempre, C., Neven, G.: Unrestricted Aggregate Signatures. In: Arge, L., Cachin, C., Jurdzi\u0144ski, T., Tarlecki, A. (eds.) ICALP 2007. LNCS, vol.\u00a04596, pp. 411\u2013422. Springer, Heidelberg (2007)"},{"key":"40_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"416","DOI":"10.1007\/3-540-39200-9_26","volume-title":"Advances in Cryptology \u2013 EUROCRPYT 2003","author":"D. Boneh","year":"2003","unstructured":"Boneh, D., Gentry, C., Lynn, B., Shacham, H.: Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol.\u00a02656, pp. 416\u2013432. Springer, Heidelberg (2003)"},{"key":"40_CR5","first-page":"1","volume-title":"The 3rd USENIX Workshop on Hot Topics in Security (HOTSEC 2008), USENIX HotSec","author":"U. Braun","year":"2008","unstructured":"Braun, U., Shinnar, A., Seltzer, M.: Securing provenance. In: The 3rd USENIX Workshop on Hot Topics in Security (HOTSEC 2008), USENIX HotSec, pp. 1\u20135. USENIX Association, Berkeley (2008)"},{"key":"40_CR6","doi-asserted-by":"crossref","unstructured":"Deora, V., Contes, A., Rana, O.F., Rajbhandari, S., Wootten, I., Kifor, T., Varga, L.Z.: Navigating provenance information for distributed healthcare management. In: Web Intelligence, pp. 859\u2013865 (2006)","DOI":"10.1109\/WI.2006.122"},{"key":"40_CR7","unstructured":"Groth, P.T.: The Origin of Data: Enabling the Determination of Provenance in Multi-institutional Scientific Systems through the Documentation of Processes. PhD thesis, University of Southampton (2007)"},{"issue":"9","key":"40_CR8","doi-asserted-by":"publisher","first-page":"1246","DOI":"10.1109\/TPDS.2008.215","volume":"20","author":"P.T. Groth","year":"2009","unstructured":"Groth, P.T., Moreau, L.: Recording process documentation for provenance. IEEE Trans. Parallel Distrib. Syst.\u00a020(9), 1246\u20131259 (2009)","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"2","key":"40_CR9","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1007\/BF00196791","volume":"3","author":"S. Haber","year":"1991","unstructured":"Haber, S., Stornetta, W.S.: How to time-stamp a digital document. J. Cryptology\u00a03(2), 99\u2013111 (1991)","journal-title":"J. Cryptology"},{"key":"40_CR10","doi-asserted-by":"crossref","unstructured":"Hasan, R., Sion, R., Winslett, M.: Introducing secure provenance: problems and challenges. In: ACM Workshop on Storage Security and Survivability (StorageSS 2007), pp. 13\u201318 (2007)","DOI":"10.1145\/1314313.1314318"},{"key":"40_CR11","doi-asserted-by":"crossref","unstructured":"Hasan, R., Sion, R., Winslett, M.: The case of the fake picasso: Preventing history forgery with secure provenance. In: 7th Conference on File and Storage Technologies (FAST 2009), pp. 1\u201314 (2009)","DOI":"10.1145\/1629080.1629082"},{"issue":"4","key":"40_CR12","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1629080.1629082","volume":"5","author":"R. Hasan","year":"2009","unstructured":"Hasan, R., Sion, R., Winslett, M.: Preventing history forgery with secure provenance. ACM Transactions on Storage\u00a05(4), 12:1\u201312:43 (2009)","journal-title":"ACM Transactions on Storage"},{"issue":"6","key":"40_CR13","doi-asserted-by":"publisher","first-page":"38","DOI":"10.1109\/MIS.2006.119","volume":"21","author":"T. Kifor","year":"2006","unstructured":"Kifor, T., Varga, L.Z., V\u00e1zquez-Salceda, J., \u00c1lvarez-Napagao, S., Willmott, S., Miles, S., Moreau, L.: Provenance in agent-mediated healthcare systems. IEEE Intelligent Systems\u00a021(6), 38\u201346 (2006)","journal-title":"IEEE Intelligent Systems"},{"issue":"5","key":"40_CR14","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1002\/cpe.1236","volume":"20","author":"S. Miles","year":"2008","unstructured":"Miles, S., Groth, P.T., Munroe, S., Jiang, S., Assandri, T., Moreau, L.: Extracting causal graphs from an open provenance data model. Concurrency and Computation: Practice and Experience\u00a020(5), 577\u2013586 (2008)","journal-title":"Concurrency and Computation: Practice and Experience"},{"issue":"6","key":"40_CR15","doi-asserted-by":"publisher","first-page":"743","DOI":"10.1016\/j.future.2010.07.005","volume":"27","author":"L. Moreau","year":"2011","unstructured":"Moreau, L., Clifford, B., Freire, J., Futrelle, J., Gil, Y., Groth, P.T., Kwasnikowska, N., Miles, S., Missier, P., Myers, J., Plale, B., Simmhan, Y., Stephan, E.G., Van den Bussche, J.: The open provenance model core specification (v1.1). Future Generation Comp. Syst.\u00a027(6), 743\u2013756 (2011)","journal-title":"Future Generation Comp. Syst."},{"key":"40_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1007\/978-3-540-89965-5_31","volume-title":"Provenance and Annotation of Data and Processes","author":"L. Moreau","year":"2008","unstructured":"Moreau, L., Freire, J., Futrelle, J., McGrath, R.E., Myers, J., Paulson, P.: The Open Provenance Model: An Overview. In: Freire, J., Koop, D., Moreau, L. (eds.) IPAW 2008. LNCS, vol.\u00a05272, pp. 323\u2013326. Springer, Heidelberg (2008)"},{"key":"40_CR17","unstructured":"Muniswamy-Reddy, K.-K.: Foundations for Provenance-Aware Systems. PhD thesis, Harvard University (2010)"},{"key":"40_CR18","doi-asserted-by":"crossref","unstructured":"Simmhan, Y., Plale, B., Gannon, D.: A survey of data provenance in e-science. In: SIGMOD Record, pp. 31\u201336 (2005)","DOI":"10.1145\/1084805.1084812"},{"key":"40_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1007\/978-3-642-13739-6_22","volume-title":"Data and Applications Security and Privacy XXIV","author":"A. Syalim","year":"2010","unstructured":"Syalim, A., Nishide, T., Sakurai, K.: Preserving Integrity and Confidentiality of a Directed Acyclic Graph Model of Provenance. In: Foresti, S., Jajodia, S. (eds.) Data and Applications Security and Privacy XXIV. LNCS, vol.\u00a06166, pp. 311\u2013318. Springer, Heidelberg (2010)"},{"issue":"7","key":"40_CR20","doi-asserted-by":"crossref","first-page":"1894","DOI":"10.1587\/transinf.E95.D.1894","volume":"95-D","author":"A. Syalim","year":"2012","unstructured":"Syalim, A., Nishide, T., Sakurai, K.: Securing provenance of distributed processes in an untrusted environment. IEICE Transactions\u00a095-D(7), 1894\u20131907 (2012)","journal-title":"IEICE Transactions"},{"key":"40_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1007\/11890850_21","volume-title":"Provenance and Annotation of Data","author":"V. Tan","year":"2006","unstructured":"Tan, V., Groth, P.T., Miles, S., Jiang, S., Munroe, S.J., Tsasakou, S., Moreau, L.: Security Issues in a SOA-Based Provenance System. In: Moreau, L., Foster, I. (eds.) IPAW 2006. LNCS, vol.\u00a04145, pp. 203\u2013211. Springer, Heidelberg (2006)"}],"container-title":["Lecture Notes in Computer Science","Information and Communicatiaon Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-36818-9_40","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T10:14:04Z","timestamp":1557569644000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-36818-9_40"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642368172","9783642368189"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-36818-9_40","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}